Comprehensive analysis on hardware trojans in 3D ICs: characterization and experimental impact assessment
Abstract Three-dimensional (3D) integration facilitates to integrate an increasing number of
transistors into a single package. Despite improved performance and power efficiency, the
integration of multiple dies in the same package potentially leads to new security threats,
such as 3D hardware Trojans. This work conducts a thorough survey on hardware Trojans
reported in 3D integrated circuits (ICs) and systems, and proposes a comprehensive
characterization of 3D hardware Trojans. Several case studies are performed to validate the …
transistors into a single package. Despite improved performance and power efficiency, the
integration of multiple dies in the same package potentially leads to new security threats,
such as 3D hardware Trojans. This work conducts a thorough survey on hardware Trojans
reported in 3D integrated circuits (ICs) and systems, and proposes a comprehensive
characterization of 3D hardware Trojans. Several case studies are performed to validate the …
Abstract
Three-dimensional (3D) integration facilitates to integrate an increasing number of transistors into a single package. Despite improved performance and power efficiency, the integration of multiple dies in the same package potentially leads to new security threats, such as 3D hardware Trojans. This work conducts a thorough survey on hardware Trojans reported in 3D integrated circuits (ICs) and systems, and proposes a comprehensive characterization of 3D hardware Trojans. Several case studies are performed to validate the feasibility of 3D hardware Trojan implementation. Our experimental results indicate that 3D ICs indeed provide a better environment for inserting stealthy thermal-based Trojans than 2D ICs. Multiple FPGA boards are utilized to conceptually emulate the stacked 3D ICs that experience multi-tier hardware Trojans. The stealthiness and effectiveness of the proposed multi-tier Trojans are validated in our case studies. The emulation results further show that the existing current-based self-referencing Trojan detection method designed for 2D Trojans will result in a lower detection rate in 3D scenarios.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果